Abstract
Providing security to data in the form of text is cryptography, but visual cryptography provides defense for visual images. In this, we intended a mechanism to encipher an image into different levels, i.e., intensity variation, pixel swapping, steganography, and randomization, which seizes network as a means to attain the actual receiver who does the retrieval procedure in reverse order. Different methods are developed, namely intensity variation on each and every pixel of an image and color pixel value swapping within an image, calculating the pixel intensity values and embedding them using steganography, and randomization process. Instead of using external images for manipulation, it provides a better encryption process. Multiple images can be used, which is a good parameter of the proposed procedure. Hence, multiple images can be transformed at a time and more security can be achieved by this proposed method.
References
Gnanaguruparan, M., Kak, S.: Recursive hiding of secrets in visual cryptography. Cryptologia 26, 68–76 (2002)
Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of k out of n visual secret sharing schemes. Des. Codes Cryptogr. 11(2), 179–196 (1997)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)
Anitha, R., Sasirekha, N.: Image securing mechanism by gradient techniques. Int. J. Comput. Eng. Appl. VIII(I), 55–64 (2014)
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT ”94. Lecture Notes in Computer Science
Koppu, S., Madhu Viswanatham, V.: A survey on security issues: digital images. Int. J. Pharm. Technol. 8(2),13420–13427 (2016)
Addin Ahmed Salem Al-Maweri, N.: State-of-the-art in techniques of text digital watermarking: challenges and limitations. Int. J. Comput. Sci. 12(2) (2016)
Liu, F.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012)
Yu, J., Li, F., Cheng, H., Zhang, X.: Spatial steganalysis using contrast of residuals. IEEE Signal Process. Lett. 23(7), 989–992 (2016)
Sah, H.R., Gunasekaran, G.: Privacy preserving data mining using image slicing and visual cryptography. In: IEEE Transactions, pp. 1–7 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Narayana, Y.V., Prashant, A., Prasad, D.V., Kumar, C.S.P. (2018). Multiple Images Defending Process by Leaning Techniques. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Computing and Informatics . Smart Innovation, Systems and Technologies, vol 77. Springer, Singapore. https://doi.org/10.1007/978-981-10-5544-7_10
Download citation
DOI: https://doi.org/10.1007/978-981-10-5544-7_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5543-0
Online ISBN: 978-981-10-5544-7
eBook Packages: EngineeringEngineering (R0)